Advertisement

The data base of selected permutations

Extented abstract
  • Jun-Hui Yang
  • Zong-Duo Dai
  • Ken-Cheng Zeng
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 739)

Abstract

The so called selected permutations, which can be used to compose S-boxes in the DES-like ciphers, are classified under the action of a transformation group G*. A method for building up a data base of the selected permutations is given. In fact, we have built up a data base which consists of one representative from each of the G*-equivaIent classes, it turns out that the data base is of size 17433 and can be easily memorized by the help of a small magnetic disc. The constructed data base together with the applications of the group G* will produce totally 17433×3×29 selected permutations, which can be used to provide ready raw material for composing S-boxes.

Key words

DES S-boxes Permutations 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. [1]
    C. Adams and S. Tavares, “The Structured Design of Cryptographically Good S-Boxes”, J. Cryptology, Vol.3, No. 1,1990.Google Scholar
  2. [2]
    D. K. Bransted, J. Gait and S. Katzke, “Report of the Workshop on Cryptography in Support of Computer Security”, NBS, Sept. 1977.Google Scholar
  3. [3]
    E. F. Brickell, J. H. Moore and M. It. Purtill, “Structure in the S-boxe of the DES”, in Advances in Cryptology: Proc. of CRYPTO'86.Google Scholar
  4. [4]
    R. Forre, “The strict avalanche criterion:spectral properties of boolean functions and an extended definition”, in Advances in Cryptology: Proc. of CRYPTO'88.Google Scholar
  5. [5]
    A. F. Webster and S. E. Tavares, “On the design of S-boxes”, in Advances in Cryptology: Proc. of CRYPTO'85.Google Scholar
  6. [6]
    J. H. Yang, Z. D. Dai and K. C. Zeng, “A Cryptographic Study on S-boxes of DES Type (I). An integrated analysis of the Design Criteria for S-boxes”, To appear at “System Science and Mathematics”, 1991.Google Scholar
  7. [7]
    K. C. Zeng, Z. D. Dai and J. H. Yang, “A Cryptographic Study on S-boxes of DES Type (II). An Entropy Leakage Analysis for the Key”, To appear at “System Science and Mathematics”, 1991.Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 1993

Authors and Affiliations

  • Jun-Hui Yang
    • 1
  • Zong-Duo Dai
    • 2
  • Ken-Cheng Zeng
    • 2
  1. 1.Computing CenterAcademia SinicaBeijingChina
  2. 2.Graduate SchoolAcademia SinicaBeijingChina

Personalised recommendations